Security

  • Free or not free; that is the question

    There really are no free development tools. Here’s what you need to consider when choosing development tools for your next project.

    Read Article
  • AdaCore Technologies for cyber security, part 2: The challenge of secure software

    This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.

    Read Article
  • AdaCore Technologies for cyber security, part 1

    We're all serious about security, some more than others. This first in a series of articles on cyber-security shows that it's really necessary and it's really possible to be secure.

    Read Article
  • Cybersecurity for Automobiles: BlackBerry’s 7-Pillar Recommendation

    Cybersecurity for Automobiles: BlackBerry’s 7-Pillar Recommendation

    As vehicles become increasingly connected and reliant on software, new threats emerge. To address these concerns, help mitigate security risks, and build the foundation for a reliable and secure car,

    Download PDF
  • ×

    Stay updated on security-related design topics with the security edition of our Embedded Daily newsletter.

    Subscribed! Look for 1st copy soon.
    Error - something went wrong!
  • IoT Design Guide 2018

    IoT Design Guide 2018

    With increasing desire to move more intelligence and connectivity closer to the edge of Internet of Things networks, industry is pushing through the fog and towards mist computing.

    Download PDF
  • Five Minutes with… Stefan Skarin, CEO, IAR Systems

    Five Minutes with… Stefan Skarin, CEO, IAR Systems

    The news from IAR is that they acquired a 100% stake in Secure Thingz, a provider of advanced security solutions for embedded and IoT systems.

    Read Article
  • Using Java in Safety-Critical Applications ISO 26262 Certification for Real-Time Java Code

    Using Java in Safety-Critical Applications ISO 26262 Certification for Real-Time Java Code

    Though conventional Java is fine for applications that do not have a time bound, i.e., do not have real-time requirements, it should not be used for control applications.

    Download PDF
  • Take our reader survey, win a $50 Amazon gift card

    It only takes a few minutes and you'll help our team deliver relevant and engaging content.

    Read Article
  • Adacore discusses "Make with Ada" challenge and new product announcement at #ARM TechCon 20173:29

    Adacore discusses "Make with Ada" challenge and new product announcement at #ARM TechCon 2017

    Jamie Ayre with Adacore talks to Rich Nass with Embedded Computing Design about the ``Make with Ada'' challenge that occurred earlier this year. The contest aimed to help the embedded software communi

    Watch Video
  • IAR Systems discussing safety and security at #ARM TechCon 20173:22

    IAR Systems discussing safety and security at #ARM TechCon 2017

    SANTA CLARA, CA -- Stefan Skarin, CEO at IAR Systems, talked to Rich Nass with Embedded Computing Design at ARM TechCon 2017 about safety and security. Stefan discusses code quality, security for deve

    Watch Video
  • Wibu-Systems Launches CodeMeter Cloud Licensing Platform

    Cloud Licensing Technology to be Showcased at SPS IPC Drives November 28-30, 2017 in Nuremberg, Germany

    Read Article
  • Advantech and IGEL Offer Easy-to-Manage Cloud Computing Solutions for the Healthcare Sector

    Simple Endpoint Management and High-Performance Hardware Combine to Support Demanding Hospital Applications

    Read Article
  • Learn how to keep IoT devices secure – from design to decommission

    In this final class, we will cover the critical aspects of how to test and deploy our IoT solution, and how to keep it secure and operational through ongoing monitoring and maintenance.

    Read Article
  • Have we forgotten what the ancients taught us in building defense systems?

    Have we forgotten what the ancients taught us in building defense systems?

    I find the multilayered defense system built into many ancient forts fascinating. Fort Dún Aonghasa in Ireland is a great example of how a multilayered defense system was used.

    Read Article
  • SecureRF and Intel deliver future-proof FPGA security

    Read Article
  • Identifying secure firmware update mechanisms and open source options for embedded Linux devices

    Identifying secure firmware update mechanisms and open source options for embedded Linux devices

    The traditional, and best-until-proven-otherwise way of updating an embedded device is performing a whole image update. In baremetal devices, this would be the whole image with all the device firmware

    Read Article
  • Skkynet to Hold OPC UA Sandpit Event in Osaka

    Technology providers from six countries gather in Japan to demonstrate secure Industrial IoT cloud connectivity for OPC UA products.

    Read Article
  • Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    NAND flash media reliability concerns have largely been addressed through (1) advances in error correction code (ECC) and wear leveling algorithms and (2) NAND flash over-provisioning.

    Download PDF
  • A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    How to affordably decrease safety critical processing subsystem development time and program risk using DO-178 / DO-254 certifiable off-the-shelf building blocks.

    Download PDF
  • Learn how to design safe, secure, and reliable IoT critical infrastructure systems

    This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will teach you how to adapt and stay relevant in this new software-defined world.

    Read Article
  • loading
    Loading More...